WO2015057264A1 - Injection of simulated sources in a system of networked sensors - Google Patents
Injection of simulated sources in a system of networked sensors Download PDFInfo
- Publication number
- WO2015057264A1 WO2015057264A1 PCT/US2014/037210 US2014037210W WO2015057264A1 WO 2015057264 A1 WO2015057264 A1 WO 2015057264A1 US 2014037210 W US2014037210 W US 2014037210W WO 2015057264 A1 WO2015057264 A1 WO 2015057264A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- predetermined
- simulated
- source
- central processor
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/12—Checking intermittently signalling or alarm systems
- G08B29/14—Checking intermittently signalling or alarm systems checking the detection circuits
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B9/00—Simulators for teaching or training purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/80—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/12—Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
Definitions
- Simulated sources solve many such problems.
- a simulated source injected into a detection system can be made indistinguishable from a real source, from the point of view of sensor nodes and trainees, providing realistic training and systems testing.
- a simulated source has no associated radioactive or other hazards since there is no actual source involved. And the only practical limit on the diversity of simulated training scenarios is the imagination of the programmer responsible for the simulation. Unusual or unexpected situations are just as easy to simulate as run-of-the-mill hazards and do not require stockpiling of exotic materials.
- Simulated sources can be used both to train users and also to test the system.
- FIGS. 1-3 schematically show a sensor network in which a simulated source or sources are used for training or testing.
- the presence of a source can be detected using a network of sensors.
- a group of people e.g., security personnel, first responders, etc., may patrol an area, each carrying or wearing a detector that is connected to a network, in some cases wirelessly.
- Sensors may also be fixed in place, for example at a security checkpoint or other significant location.
- Sensors may also be mounted on vehicles, for example, vehicles for used in public transportation, vehicles used by the general public, or vehicles used by first responders or other security or patrol personnel, such as cars, trucks, boats or aircraft.
- the detector may be a radiation detector, a chemical detector, or any other suitable detector for the source in question.
- each networked sensor collects data that may be transmitted to a central processor or other nodes in the network, and the sensor may in turn receive such signals, with the result that data from the network as a whole is collectively processed to determine if, when, and where a source is present.
- the presence of a source can be simulated.
- the properties of the simulated source such as location, velocity, and activity level, are predetermined. Those properties are then combined with the known properties of each sensor node, such as location, velocity and sensitivity, to calculate an estimate what each sensor's response would be if the simulated source were real.
- Other simulated source properties may be included as well, for example, orientation and directional emission characteristics, or a spectral characteristic such as emission according to the spectrum of a particular radioisotope.
- the estimated response can be treated, for training or testing purposes, as if it were the actual response of the detector to a real source. This can be accomplished in one, or a combination, of three ways.
- the simulated source properties could be transmitted to each sensor node 11-16 where each node would individually estimate its hypothetical response, resulting in simulated data. That simulated data would then be treated by the sensor node in the same way that actual data would in an actual deployment of the system, by transmitting the data across the network for collective analysis.
- the collective analysis could be carried out by a central processor 17, or in some other way over the network. This method requires each sensor node to maintain the necessary information about its own state to be able to estimate its response to an arbitrary source.
- Such information might include location, velocity, sensitivity, and could also include a description of its physical surroundings, either empirical or simulated, for example a map of background radiation, or the locations of significant geographica l features like buildings or bodies of water.
- the node can also sense and report on other aspects of its local environment, such as ambient temperature, humidity, and/or barometric pressure, the lack or presence of precipitation, amount and/or type of precipitation, and wind speed a nd/or direction.
- a central processor 27 would store information a bout the simulated source, and collect information a bout the state of each sensor 21-26, such as sensor location, sensor velocity and sensor sensitivity. The central processor 27 would then calculate for each sensor 21-26 an estimate of the sensor's response to the simulated source. The central processor 27 could likewise store additional information, either empirical or simulated, on background radiation or significant geography that could be used to construct a physical model which in turn could be included in the estimate of each sensor's response to the simulated source. The simulated data could then be sent back to each sensor node for high level processing, e.g., in systems where each node is separately responsible for triggering alarms, or reporting data to its user.
- the second alternative may allow for the use of more complex information and physical models, since a central processor can have more computing power than a porta ble sensor node.
- a third alternative shown schematically in FIG. 3, all calculation and processing would be carried out by a central processor 37, including high-level calculations.
- Individual nodes 31-36 would simply receive from the central processor any data to be displayed or alarm indications to be communicated to the user.
- the nodes need not be fully functioning sensor nodes, and could instead be training nodes capa ble only of receiving instructions regarding what to display through a user interface, i.e., "dum b" nodes.
- the sensor nodes could contribute actual measurements of background to the central processor and function as more than "du mb" training nodes.
- the individual nodes can either continually measure and record background radiation and contribute that data to the simulation, or simply rely on a simulated background.
- the simulated source properties can be based on a purely virtual source whose properties are based on no real world data, or the simulated source location as a function of time can be based on the location of a "prey" node.
- the prey node can report its position back to the central processor as a function of time.
- the central processor could then use the prey node's location as a predetermined location of the simulated source at each time.
- the prey node could be carried by tra ining personnel who could add to the training scenario, for example, by moving to evade trainees carrying sensor nodes.
- an advantage of the systems and methods described herein is that the simulated signal is injected into a live network, in many cases including live data being collected and analyzed in real-time.
- the simu lated source could be the only data, simulated or real, in the system. Or the simu lated source could be injected into the system along with injected, simulated background measurements, for example, in order to test the detection power of a system as a function of signal to noise ratio. Or the simulated source could be injected over actual data being acquired in real time.
- Sim-over-live a realistic training and/or testing environment
- a system can avoid computationally expensive simulation of background radiation, while simultaneously making the simulation realistic.
- Such an injected source ca n be included with or without alerting users that a simulation is going on. That has the advantage of making the test more realistic.
- Another benefit is avoiding downtime; during such a test, the system could continue to operate normally at the same time, continuing to potentially detect real sources during the simulation.
- any simulation can be carried out with a plurality of simulated sources, or a single simulated source.
- injection of sources can be usefu l both for testing the operation of a system of nodes, e.g., systems integration of the various parts of the network, and also for empirically testing the sensitivity of the system as a whole.
- a simulated source can be injected into a working system in order to see whether, in a real-life situation, a given type of source would be detected by the system. This can provide insight into how many sensors are required for a particular threat scenario or to test new CONOPs in operationally realistic scenarios.
- the central processor can, at each time step, store the locations and simulated responses of each node. This allows for after-the-fact analysis of the response of the system and its users, e.g., a playback of the simulation.
- a method can simulate the response of a system to at least one simulated source, the at least one simulated source having at least a predetermined simulated source location and a predetermined simulated source activity level at a predetermined time.
- the system can include a plurality of nodes; a central processor programmed to determine whether a source is detected by applying a predetermined algorithm to data associated with the plurality of nodes, the central processor having stored within it the predetermined simulated source location and the predetermined simulated source activity level; a network linking each node and the central processor such that signals can be transmitted between each node and the central processor; and an output device.
- the method can include: (1) transmitting through the network from each node to the central processor a measured or inferred location for that node at the predetermined time; (2) calculating, based on at least (a) the measured or inferred location of each node at the predetermined time, (b) the predetermined simulated source location at the predetermined time, and (c) the predetermined simulated source activity level at the predetermined time, simulated response data for each node associated with the predetermined time; (3) in the central processor, applying the predetermined algorithm to the simulated response data for all the nodes, thereby determining whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time; and (4) signaling with the output device whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
- step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based on simulated background data for each node.
- the simulated background data for each node can be generated by the central processor based on (a) the measured or inferred location of each node and (b) a predetermined background model stored in the central processor.
- each of, or some of, the plurality of nodes can include a sensor.
- step (1) can further include transmitting through the network from each node to the central processor background data measured with that node's sensor; step (2) can be carried out in the central processor; and in step (2), calculating simulated response data for each node can be further based upon the transmitted background data measured with that sensor.
- each of the plurality of nodes can further includes a node processor; in step (2), calculating simulated response data for each node can be carried out in that node's processor; and in step (2), calculating simulated response data for each node can be further based upon background data measured with that node's sensor.
- a sensor on a node can be, for example, a radiation detector or a chemical detector.
- the at least one simulated source can have at least predetermined simulated source locations and a predetermined simulated source activity levels at each of a plurality of predetermined times.
- Such methods can further include repeating steps (l)-(4) at each of the plurality of predetermined times.
- the at least one simulated source further can have a predetermined simulated source trajectory including the predetermined simulated source location and a predetermined simulated source velocity at each predetermined time; step (1) can further include transmitting across the network from each node to the central processor a measured or inferred velocity for each node at the predetermined time; and in step (2), calculating simulated response data for each node can further be based on the predetermined simulated source trajectory and velocity of that node at the predetermined time.
- the trajectory can be simple, such as for a stationary source, or more complex, such as a simulated trajectory of a pedestrian, or a vehicle.
- Each node may be identical or substantially identical. Or the system may include nodes with a variety of different characteristics.
- One or more nodes may be located on a person.
- One or more nodes may be stationary, for example, a permanently installed node in a public place such as a signpost or lamppost.
- the output device may be located on one or more of the nodes, and/or on the central processor.
- Each node may include its own output device. If so, step (4) can further include signaling with (a) the output device included in the node closest to the predetermined simulated source location and/or (b) any other output devices included in nodes within a predetermined distance from the predetermined simulated source location.
- the at least one simulated source further has a
- step (2) calculating simulated response data for each node can be further based on the
- step (1) can also include transmitting through the network from each node to the central processor a measured or inferred orientation for that node at the predetermined time.
- step (2) calculating simulated response data for each node can be further based on the measured or inferred orientation for that node at the predetermined time.
- step (1) can also include transmitting through the network from each node to the central processor at least one measured or inferred environmental condition.
- calculating simulated response data for each node can be further based on the transmitted at least one measured or inferred environmental condition for that node.
- environmental conditions can include for example, (a) rate, amount or type of precipitation, (b) wind speed and/or wind direction, (c) ambient temperature, e.g., air or water temperature, (d) humidity, and (e) barometric pressure.
- Some such methods can also include (5) storing at the predetermined time, the simulated response data for each node associated with the predetermined time and data representative of whether a real source at the predetermined simulated source location having the predetermined simulated source activity level would have been detected at the predetermined time.
- Such methods may also include repeating step (5) at each of the plurality of predetermined times.
- storing can include storing data in either (a) the central processor, or (b) one or more nodes, or both (a) and (b).
- the at least one simulated source can be a plurality of simulated sources.
- the predetermined simulated source location can be a location in a two or three dimensional coordinate system.
- one of the plurality of nodes is a designated prey node.
- the predetermined simulated source location at the predetermined time can be based on the measured or inferred location of the prey node at the predetermined time.
- a method of simulating the response of a system to a simulated source can include providing a system including (a) a plurality of sensors and (b) a central processor having an output device; formulating, in the central processor, a simulated source; estimating the response of each of the plurality of sensors to the simulated source; and outputting from the output device a signal indicative of whether the system would be able to detect a real source having the properties of the simulated source.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Public Health (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Biomedical Technology (AREA)
- Databases & Information Systems (AREA)
- Pathology (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Educational Administration (AREA)
- Educational Technology (AREA)
- Computational Linguistics (AREA)
- Computer Hardware Design (AREA)
- Geometry (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016549007A JP2016535379A (ja) | 2013-10-16 | 2014-05-07 | ネットワーク化センサのシステム内への模擬発生源の注入 |
EP14854212.9A EP3058504B1 (de) | 2013-10-16 | 2014-05-07 | Injektion von simulierten quellen in einem system mit vernetzten sensoren |
US14/358,613 US10579747B2 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
US16/713,566 US20200117840A1 (en) | 2013-10-16 | 2019-12-13 | Injection of simulated sources in a system of networked sensors |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361891636P | 2013-10-16 | 2013-10-16 | |
US61/891,636 | 2013-10-16 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/358,613 A-371-Of-International US10579747B2 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
US16/713,566 Continuation US20200117840A1 (en) | 2013-10-16 | 2019-12-13 | Injection of simulated sources in a system of networked sensors |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015057264A1 true WO2015057264A1 (en) | 2015-04-23 |
Family
ID=52828530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2014/037210 WO2015057264A1 (en) | 2013-10-16 | 2014-05-07 | Injection of simulated sources in a system of networked sensors |
Country Status (4)
Country | Link |
---|---|
US (2) | US10579747B2 (de) |
EP (1) | EP3058504B1 (de) |
JP (1) | JP2016535379A (de) |
WO (1) | WO2015057264A1 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113259932A (zh) * | 2021-05-19 | 2021-08-13 | 贵州大学 | 一种WSNs中的源节点位置隐私保护策略 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10650700B2 (en) | 2015-01-08 | 2020-05-12 | Lawrence Livermore National Security, Llc | Incident exercise in a virtual environment |
KR101713253B1 (ko) * | 2017-01-13 | 2017-03-09 | (주)라드서치 | 가상사고 기반 방사선비상 현장탐사 훈련방법 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040002843A1 (en) * | 2002-05-13 | 2004-01-01 | Consolidated Global Fun Unlimited, Llc | Method and system for interacting with simulated phenomena |
US20070090942A1 (en) * | 2000-10-02 | 2007-04-26 | Berry Kenneth M | Methods for responding to biological, chemical or nuclear attacks |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60185185A (ja) * | 1984-03-02 | 1985-09-20 | Sumitomo Electric Ind Ltd | 放射線検出方法と装置 |
US4973913A (en) * | 1990-02-08 | 1990-11-27 | Mitsubishi Denki Kabushiki Kaisha | Radiation measuring apparatus |
US5142559A (en) * | 1990-05-11 | 1992-08-25 | The Research Foundation Of State University Of New York | Radiation detection system including radiation alignment means and isocentrically rotatable detectors |
US5304065A (en) * | 1992-11-13 | 1994-04-19 | Consultec Scientific, Inc. | Instrument simulator system |
GB9519098D0 (en) * | 1995-09-19 | 1995-11-22 | Pike Steven D | Contamination training simulator |
US6393375B1 (en) * | 1999-01-15 | 2002-05-21 | En'urga Inc. | System and method for determining combustion temperature using infrared emissions |
US5979565A (en) * | 1999-03-03 | 1999-11-09 | Wicks; Edward A. | Emergency ventilation system for biological/chemical contamination |
US6293861B1 (en) * | 1999-09-03 | 2001-09-25 | Kenneth M. Berry | Automatic response building defense system and method |
US7194395B2 (en) * | 2000-02-23 | 2007-03-20 | The United States Of America As Represented By The Secretary Of The Army | System and method for hazardous incident decision support and training |
WO2002040092A2 (en) * | 2000-11-14 | 2002-05-23 | Apple Marc G | Directional energy emitting implant |
US6531701B2 (en) * | 2001-03-14 | 2003-03-11 | Trw Inc. | Remote trace gas detection and analysis |
US6946300B2 (en) * | 2002-02-01 | 2005-09-20 | Control Screening, Llc | Multi-modal detection of explosives, narcotics, and other chemical substances |
US20040015336A1 (en) * | 2002-07-19 | 2004-01-22 | Kulesz James J. | Automatic detection and assessment of chemical, biological, radiological and nuclear threats |
US6984524B2 (en) * | 2002-09-12 | 2006-01-10 | Control Screening, Llc | Chemiluminescent detection of explosives, narcotics, and other chemical substances |
US6946644B2 (en) * | 2002-12-19 | 2005-09-20 | Honeywell International Inc. | Sensor for multi-band radiation detection within a field of view |
CA2552358A1 (en) * | 2002-12-31 | 2004-07-15 | Telaura Inc. | System and method for real-time detection and remote monitoring of pathogens |
US7391557B1 (en) * | 2003-03-28 | 2008-06-24 | Applied Photonics Worldwide, Inc. | Mobile terawatt femtosecond laser system (MTFLS) for long range spectral sensing and identification of bioaerosols and chemical agents in the atmosphere |
US6914447B2 (en) * | 2003-04-23 | 2005-07-05 | Texas Instruments Incorporated | High activity, spatially distributed radiation source for accurately simulating semiconductor device radiation environments |
US7770224B2 (en) * | 2004-10-18 | 2010-08-03 | Lockheed Martin Corporation | CBRN attack detection system and method I |
US7507089B2 (en) * | 2005-07-15 | 2009-03-24 | Raytheon Company | Methods and apparatus to provide training against improvised explosive devices |
US7412356B1 (en) * | 2007-01-30 | 2008-08-12 | Lawrence Livermore National Security, Llc | Detection and quantification system for monitoring instruments |
US20120132814A1 (en) * | 2007-02-26 | 2012-05-31 | Irving Weinberg | Radiation detection device, system and related methods |
US9728100B2 (en) * | 2008-02-01 | 2017-08-08 | Lion Group, Inc. | Hazard suppression training simulator and method of training |
US9165475B2 (en) * | 2008-02-20 | 2015-10-20 | Hazsim, Llc | Hazardous material detector simulator and training system |
US20090263770A1 (en) * | 2008-02-20 | 2009-10-22 | Ambrose Philip L | System and method for simulating hazardous environments for portable detection meters used by first responders |
US9529974B2 (en) * | 2008-02-25 | 2016-12-27 | Georgetown University | System and method for detecting, collecting, analyzing, and communicating event-related information |
US8794973B2 (en) * | 2008-04-17 | 2014-08-05 | Radiation Safety And Control Services, Inc. | Contamination detection simulation systems and methods |
US9280913B2 (en) * | 2009-07-10 | 2016-03-08 | Lincoln Global, Inc. | Systems and methods providing enhanced education and training in a virtual reality environment |
US8827714B2 (en) * | 2009-06-22 | 2014-09-09 | Lawrence Livermore National Secuity, LLC. | Web-based emergency response exercise management systems and methods thereof |
GB201119456D0 (en) * | 2011-11-11 | 2011-12-21 | Cobham Cts Ltd | Hazardous device detection training system |
WO2013156866A2 (en) * | 2012-04-15 | 2013-10-24 | Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek Tno | Fluorescent nano-sensors for oil and gas reservoir characterization |
DE102012221862A1 (de) * | 2012-11-29 | 2014-06-05 | Leibniz-Institut Für Atmosphärenphysik E.V. An Der Universität Rostock | Verfahren und Vorrichtung zum Bestimmen sowie Berechnen eines Streustrahlungsspektrums sowie Verfahren zum Komprimieren von Daten |
US9836993B2 (en) * | 2012-12-17 | 2017-12-05 | Lawrence Livermore National Security, Llc | Realistic training scenario simulations and simulation techniques |
-
2014
- 2014-05-07 WO PCT/US2014/037210 patent/WO2015057264A1/en active Application Filing
- 2014-05-07 EP EP14854212.9A patent/EP3058504B1/de active Active
- 2014-05-07 JP JP2016549007A patent/JP2016535379A/ja active Pending
- 2014-05-07 US US14/358,613 patent/US10579747B2/en not_active Expired - Fee Related
-
2019
- 2019-12-13 US US16/713,566 patent/US20200117840A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070090942A1 (en) * | 2000-10-02 | 2007-04-26 | Berry Kenneth M | Methods for responding to biological, chemical or nuclear attacks |
US20040002843A1 (en) * | 2002-05-13 | 2004-01-01 | Consolidated Global Fun Unlimited, Llc | Method and system for interacting with simulated phenomena |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113259932A (zh) * | 2021-05-19 | 2021-08-13 | 贵州大学 | 一种WSNs中的源节点位置隐私保护策略 |
Also Published As
Publication number | Publication date |
---|---|
EP3058504B1 (de) | 2020-07-15 |
EP3058504A1 (de) | 2016-08-24 |
US10579747B2 (en) | 2020-03-03 |
JP2016535379A (ja) | 2016-11-10 |
US20200117840A1 (en) | 2020-04-16 |
EP3058504A4 (de) | 2017-05-03 |
US20150186566A1 (en) | 2015-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cova et al. | Warning triggers in environmental hazards: Who should be warned to do what and when? | |
US20200117840A1 (en) | Injection of simulated sources in a system of networked sensors | |
US9836993B2 (en) | Realistic training scenario simulations and simulation techniques | |
KR101885350B1 (ko) | 대기오염 통합 관리 시스템 | |
US11378485B2 (en) | Structural monitoring system | |
CN105357063A (zh) | 一种网络空间安全态势实时检测方法 | |
Sättele et al. | Quantifying the effectiveness of early warning systems for natural hazards | |
US7770224B2 (en) | CBRN attack detection system and method I | |
Oldrini et al. | Validation and sensitivity study of the PMSS modelling system for puff releases in the Joint Urban 2003 field experiment | |
US20200066140A1 (en) | System and method for indicating building fire danger ratings | |
Yee | Bayesian probabilistic approach for inverse source determination from limited and noisy chemical or biological sensor concentration measurements | |
Ambros et al. | Proactive assessment of road curve safety using floating car data: An exploratory study | |
Miranda et al. | A wireless sensor network for collision detection on guardrails | |
US7496483B2 (en) | CBRN attack detection system and method II | |
KR101938550B1 (ko) | 방재요원 훈련 시스템, 방재요원 훈련용 단말기 및 방재요원 훈련 시스템 운용방법 | |
Balamurugan et al. | An IoT based Natural Disaster Monitoring for Railway Accident Warning Alert System | |
Yassin et al. | Lora based real-time flood detection and monitoring system: A brunei darussalam based study | |
Zhang et al. | The impact of position errors on crowd simulation | |
Brauner et al. | Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts. | |
Bieringer et al. | Fusion of chemical, biological, and meteorological observations for agent source term estimation and hazard refinement | |
Vera et al. | Design and testing of a network of sensors on land surfaces to prevent landslides | |
Enoch et al. | Survey of Sensors and Techniques in Microwave Imaging for Through-Wall Imaging for Detecting Trapped Humans under Rubble | |
CN104794869B (zh) | 一种用于测试核生化报警系统的模拟装置 | |
Iervolino et al. | The crywolf issue in earthquake early warning applications for the Campania region | |
Alhaddad | Deep Learning Methods for Impact Load Identification and Displacement Estimation in Structures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 14358613 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14854212 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016549007 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2014854212 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014854212 Country of ref document: EP |